Security Forem

Cover image for CompTIA Security+ SY0-701 5.5 Study Guide: Audits, Assessments, and Penetration Testing
Andrew Despres
Andrew Despres

Posted on

CompTIA Security+ SY0-701 5.5 Study Guide: Audits, Assessments, and Penetration Testing

This study guide provides a comprehensive overview of the fundamental concepts surrounding cybersecurity audits and penetration testing. These methodologies are critical for organizations to identify vulnerabilities, ensure compliance, and strengthen their overall security posture.


1. Cybersecurity Audits and Attestation

Cybersecurity Audits and Attestation

The Purpose of an Audit

An audit is a formal examination of an organization's computing environment. While often viewed with apprehension, audits are essential for proactive security. They allow an organization to evaluate:

  • Infrastructure and Hardware: All physical and virtual devices used for network communication.
  • Software: Applications and operating systems in use.
  • Policies and Procedures: The rules governing how security is maintained.

The primary goal is to identify vulnerabilities before they can be exploited by malicious actors, effectively making the environment safer.

Internal vs. External Audits

  • Internal Audits: Conducted by personnel within the organization. These are often used to ensure compliance with internal tasks and regulations.
  • External Audits: Conducted by a third party. Some regulations require an independent group to provide oversight. This often involves providing physical space (desks) for auditors to review records and compile findings.
  • The Audit Committee: An internal group responsible for risk management. They have the authority to start or stop internal audits.

Key Concepts in Auditing

Chart comparing Key Concepts in Auditing

2. Penetration Testing (Ethical Hacking)

Penetration Testing (Ethical Hacking)

Penetration testing is an offensive security exercise where professionals attempt to find and exploit vulnerabilities in a controlled manner.

Physical Penetration Testing

Security is not just digital. If an attacker gains physical access to a device, they can circumvent the operating system by:

  • Modifying the boot process.
  • Booting from external media.
  • Replacing or modifying system files.

Because of these risks, servers are typically locked in secure data centers. A physical penetration test involves trying to enter buildings without keys, checking doors, windows, and elevators to assess the facility's physical security.

Testing Teams

  • Red Team: The offensive side. They attack systems and attempt to exploit vulnerabilities.
  • Blue Team: The defensive side. They identify and block attacks in real-time.
  • Integrated Approach: The best results occur when these teams work together. The Red Team identifies an opening and informs the Blue Team so they can patch it and improve detection.

Testing Environments

The amount of information provided to a penetration tester determines the type of test:

  1. Known Environment: Full disclosure of all systems and infrastructure.
  2. Partially Known Environment: A mix of known and unknown; often used to focus the tester on specific systems.
  3. Unknown Environment: Also known as a blind test. The tester has no prior information and must discover everything on their own.

3. Reconnaissance Techniques

Reconnaissance Techniques

Reconnaissance is the process of gathering information about a target before launching an attack.

Passive Reconnaissance

Gathering information from third-party sources without directly interacting with the target’s network. This is difficult for the target to detect.

  • Social Media: Searching for employee posts or company details.
  • Corporate Websites/Forums: Browsing for technical details or infrastructure hints.
  • Social Engineering: Manipulating individuals into revealing information.
  • Dumpster Diving: Searching through physical trash for discarded documents.
  • Third-Party Interactions: Talking to vendors or partners who work with the organization.

Active Reconnaissance

Directly querying the target's devices. This is much easier to detect because the activity is recorded in system log files (e.g., firewall logs).

  • Ping Scans: Checking if a device is online.
  • Port Scans: Identifying open services on a device.
  • DNS Queries: Querying the company's DNS server for records.
  • OS Fingerprinting: Identifying the operating system and version of a device.

Understanding the distinction between an audit and a penetration test is a cornerstone of the CompTIA Security+ syllabus. While audits provide a high-level view of your "paper" security and general infrastructure, penetration testing provides a "boots-on-the-ground" look at how an actual attacker would move through your network.

If you were an attacker today, would you find it easier to guess a password through a digital "port scan" or simply walk through an unlocked side door to the server room?

Don't stop here. Your next step in mastering the SY0-701 exam is to explore the specific tools used for active reconnaissance, such as Nmap for port scanning. Practice identifying which techniques fall under the Red Team's toolkit and which belong to the Blue Team to further solidify your defensive mindset!

Top comments (0)